Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1368310.1368339acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
short-paper

SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks

Published: 18 March 2008 Publication History

Abstract

Multi-hop routing is essential to the operation of wireless ad hoc networks. Unfortunately, it is very easy for an adversary to forge or modify routing messages to inflict severe damage on the underlying routing protocol. In this paper, we present SEAR, a Secure Efficient Ad hoc Routing protocol for ad hoc networks that is mainly based on efficient symmetric cryptography, with asymmetric cryptography used only for the distribution of initial key commitments. We show, through both theoretical examination and simulations, that SEAR provides better security with significantly less overhead than other existing secure AODV protocols.

References

[1]
Y. Hu, D. Johnson, and A. Perrig. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, I:175--192, 2003.
[2]
Y. Hu, A. Perrig, and D. B. Johnson. Ariadne: a secure on-demand routing protocol for ad hoc networks. In Proceedings of the 8th Annual International Conference on Mobile Computing and Networking, pages 12--23, New York, NY, USA, 2002. ACM Press.
[3]
C. Perkins, E. Belding-Royer, and S. Das. Ad hoc on-demand distance vector (AODV) routing, 2003. IETF RFC 3561.
[4]
C. Perkins and P. Bhagwat. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In Proceedings of the SIGCOMM Conference on Communications Architectures, Protocols and Applications, pages 234--244, 1994.
[5]
A. Perrig, R. Canetti, D. Tygar, and D. Song. The TESLA broadcast authentication protocol. Cryptobytes, 5:2--13, 2002.
[6]
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer. A secure routing protocol for ad hoc networks. In Proceedings of the 10th IEEE International Conference on Network Protocols, pages 78--87, 2002.
[7]
M. G. Zapata and N. Asokan. Securing ad hoc routing protocols. In Proceedings of ACM Workshop on Wireless Security (WiSe), pages 1--10, 2002.

Cited By

View all
  • (2023)Secure efficient communication in routing protocol in MANETs using ECC-EA3ACKai-manager's Journal on Mobile Applications and Technologies10.26634/jmt.10.1.2012510:1(12)Online publication date: 2023
  • (2020)Survey of Secure Routing Protocols for Wireless Ad Hoc NetworksWireless Personal Communications10.1007/s11277-020-07376-1Online publication date: 18-Apr-2020
  • (2017)Trust aware cooperative routing method for WANETsSecurity and Communication Networks10.1002/sec.17659:18(6189-6201)Online publication date: 7-Feb-2017
  • Show More Cited By

Index Terms

  1. SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications security
      March 2008
      399 pages
      ISBN:9781595939791
      DOI:10.1145/1368310
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 18 March 2008

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. SEAR
      2. authenticator
      3. one-way hash function

      Qualifiers

      • Short-paper

      Conference

      Asia CCS '08
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 418 of 2,322 submissions, 18%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)4
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 10 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Secure efficient communication in routing protocol in MANETs using ECC-EA3ACKai-manager's Journal on Mobile Applications and Technologies10.26634/jmt.10.1.2012510:1(12)Online publication date: 2023
      • (2020)Survey of Secure Routing Protocols for Wireless Ad Hoc NetworksWireless Personal Communications10.1007/s11277-020-07376-1Online publication date: 18-Apr-2020
      • (2017)Trust aware cooperative routing method for WANETsSecurity and Communication Networks10.1002/sec.17659:18(6189-6201)Online publication date: 7-Feb-2017
      • (2016)Overlay tunneling as a policy tool for defending mobile ad hoc networksSecurity and Communication Networks10.1002/sec.16409:17(4482-4494)Online publication date: 25-Nov-2016
      • (2013)High Secure Routing Protocol with Authentication and Confidentiality Increased in Wireless Ad Hoc NetworksArabian Journal for Science and Engineering10.1007/s13369-013-0804-x39:2(1135-1145)Online publication date: 25-Sep-2013
      • (2010)Increase the performance and enhancing Secure Authenticated Multipath Encrypted Protocol in MANET2010 IEEE International Conference on Computational Intelligence and Computing Research10.1109/ICCIC.2010.5705751(1-7)Online publication date: Dec-2010
      • (2009)SEAODVProceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human10.1145/1655925.1656096(940-944)Online publication date: 24-Nov-2009

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media